the identity-infused enterprise

21
The Identity-infused Enterprise Identify, Secure, Comply Ben Goodman Technolgy Strategist, Identity and Security [email protected] November 15, 2010

Upload: novell

Post on 07-Nov-2014

2.394 views

Category:

Technology


0 download

DESCRIPTION

Ben Goodman from Novell presentation from Gartner IAM event in November 2010

TRANSCRIPT

Page 1: The Identity-infused Enterprise

The Identity-infused EnterpriseIdentify, Secure, Comply

Ben GoodmanTechnolgy Strategist, Identity and [email protected]

November 15, 2010

Page 2: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.2

Making IT Work As One™

Page 3: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.3

21st Century Computing

The risks and challenges of computing across multiple environments must be controlled.

Users should have unimpeded access to the full computing services they need to do their jobs right.

Computing should be secure, compliantand portable.

Page 4: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.4

Identity Is Always the Foundation

Mobile Devices

Personal Computers

Identity Foundation

Page 5: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.5

Mobile Devices

Personal Computers

Identity Foundation

World Wide Web

Closed Networks

Identity Is Always the Foundation

Page 6: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.6

Mobile Devices

Personal Computers

Identity Foundation

Virtualized Workloads

Traditional Workloads on Dedicated Servers

World Wide Web

Closed Networks

Identity Is Always the Foundation

Page 7: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.7

New TechnologiesMean New Flexibility

Virtualization Cloud

“Anything” as a Service Mobile devices

Page 8: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.8

Regulations RequireMore Control

RiskOperational

Page 9: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.9

It's All about Balance

Control

Flexibility

Page 10: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.10

The Identity-Infused EnterpriseCore to Enterprise Security and Compliance

UserProvisioning

SecurityMonitoring and

Remediation

LogManagement

ComplianceIntegration

ComplianceAssurance

SecureAccess Identity

Management

Page 11: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.11

Identity Serves As the Building Block

IdentifySecure

Comply

Page 12: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.12

Identity Serves As the Building Block

Identify

•Use identity as the basic building block for people and resources

•Improve efficiency while lowering the total cost of ownership

Novell Identity Manager and Access Manager products have a lower five year total cost of ownership (TCO) than competitive products because they are easier to configure, integrate, and administer.

Novell

Novell

Novell

Competitive Set Average (Oracle, CA, IBM, Courion)

Competitive Set Average (Oracle, CA, IBM, Courion)

Competitive Set Average (Oracle, CA, IBM, Courion)

24% more than Novell

23% more than Novell

25% more than Novell

All Figures Based on 5 Year Present Value

Page 13: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.13

Integration with Security Protects the Network

Secure

•Answer the basic questions: “What happened? Who did it? Should I care?”

•Feel confident in moving to cloud based services

User Activity Monitoring• Manage user access risk• Monitor identity fraud• Enterprise view

Page 14: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.14

Leverage Compliance Investments to Get Agile

•Increase agility – controls can provide insight beyond just assuring compliance

ComplyContinuous Compliance•Management, monitoring and enforcement of IT controls so you can mitigate risks before they impact business objectives.

Control Flexibility

Page 15: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.15

An Identity-Infused Enterprise moves at the speed of business

Less than 20 percent of enterprises know who has access to appropriate resources

By 2012, 79 percent of CIO's will leverage the cloud but are unsure of data access and security

70 percent of enterprises want a single view across all systems to identity threats and violations

Rich information on user access, privileges and provisioning activity to answer any GRC questions

Enhanced security for cloud computing model through extension of enterprise policies to the cloud applications

Centralized point of control for unified policy-based management across different systems – both ‘on premise’ and in the cloud

With an Identity-Infused EnterpriseFlexible Architecture That Supports the Cloud

Novell customer survey with infosurv around identity and security challenges - 2009

Without Identity Foundation With Identity Foundation

Page 16: The Identity-infused Enterprise

Appendix

Page 17: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.17

IT Service Management

IT Service Management

IT Service Management

Business Service Management

Business Service Management

Business Service Management

Physical Virtual Cloud

The Customer Challenge:Manage a Siloed Infrastructure

Governance and Compliance

Governance and Compliance

Governance and Compliance

Internal Cloud (On-Premise) External Cloud (Off-Premise)

Firewall

Page 18: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.18

IT Service Management

Business Service Management

Governance and Compliance

Intelligent Workload Management:From Silos to Services

Internal Cloud (On-Premise) External Cloud (Off-Premise)

Build

Secure

Measure

Manage

Firewall

Physical Virtual Cloud

Page 19: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.19

Isolated Identity Awareness

WorkloadIQ:Integrating Identity into Management

ResourceManagement

GeneralPurpose

OperatingSystem

Security andComplianceManagement

ServiceManagement

ServiceManagement

Security andComplianceManagement

ResourceManagement

Custom,SupportedOperating

System

Page 20: The Identity-infused Enterprise

© Novell, Inc. All rights reserved.20

Physical Virtual Cloud

WorkloadIQ: Lifecycle Activities

Page 21: The Identity-infused Enterprise